Static task
static1
Behavioral task
behavioral1
Sample
3bc7f6113a73c8cdb6263b544eb29a30_NeikiAnalytics.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3bc7f6113a73c8cdb6263b544eb29a30_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
General
-
Target
3bc7f6113a73c8cdb6263b544eb29a30_NeikiAnalytics.exe
-
Size
692KB
-
MD5
3bc7f6113a73c8cdb6263b544eb29a30
-
SHA1
baf03a41b1098f0070f1efea3c1b81f5adef2595
-
SHA256
289a0fd8e98c891c57d79c57ada5b7170f53bb6e64df1706aa24048daf0b9242
-
SHA512
a71d1063c4e0ee48c841a8fa6e753fc4ce71ce7da59713860d1b10b07b0bab5ab6420015ebdef38aea2d13cb7af583882660a26980f0b342af425aa082b213cf
-
SSDEEP
12288:CS9VimUe9ckspsW3VGbikbM9f04QjFgGs:TVxUeenVGRbW0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3bc7f6113a73c8cdb6263b544eb29a30_NeikiAnalytics.exe
Files
-
3bc7f6113a73c8cdb6263b544eb29a30_NeikiAnalytics.exe.dll windows:4 windows x64 arch:x64
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Sections
.text Size: 434KB - Virtual size: 434KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ